Systems | Development | Analytics | API | Testing

Process Mining, Low-code, and the Future of Innovation, Part 1

This is the decade of hyperautomation—a decade when companies are doubling down on mating critical processes to drive sustainable growth. But here’s the problem. An eye-popping 60 to 80% of your organization’s processes may be running on unstructured data such as documents and email according to news reports. Which makes them that much harder to automate manage and audit.

New report: The state of mobile shopping apps in 2021

Our brand-new report examines the ever-evolving shopping industry, delving into the trends and challenges faced by mobile retailers. Read on to find out the state of the industry, the latest product trends and cutting-edge features, and the key Mobile DevOps practices used by some of the leading shopping apps.

Updates from Bugfender Q3, 2021

We’re very proud of our first version of crash symbolication and mapping but we’re still working on follow-up versions with improvements. Please feel free to contact us with any feedback.📲 Enable/disable multiple devices at once: in the Device Config. tab, apply a filter to find the devices you want to change, then select Mark all as… and select Enabled or Disabled.

Digital Twins in Manufacturing: What You Need to Know

Across industries, we’re seeing more use of digital twins in manufacturing. Digital twin visualization technology pairs well with the sensors that manufacturers use to gather vital information on production processes. Now, the information being collected via smart manufacturing systems can be incorporated into visual, interactive models. These models help teams drive innovation.

Data Thinking: Agility in Digital Transformation

Maybe these situations sound familiar to you… You want to enhance the activities of your company with digital, data-based approaches. The opportunities and challenges of digital transformation are obvious, so it makes sense to rethink certain business strategies based on data. You’ve built a strategy through creative methods like design thinking, and you know exactly what data-centric solutions you need to develop – but the technical departments are pushing back.

Under the Hood of Macros in Elixir

Welcome back to part two of this series on metaprogramming in Elixir. In part one, we introduced metaprogramming and gave a brief overview of macros. In this part, we will explore the inner workings and behaviors of macros in more depth. As discussed in the previous post, macros are compile-time constructs in Elixir. So, before diving into how macros work, it is important to understand where macros lie within Elixir’s compilation process.

Two-Factor Authentication(2FA) using Speakeasy

Normally, you must submit a password in order to log into an application. In the case of two-factor authentication, you must also provide a one-time temporary password (also known as a token) in addition to your regular password. You can get this OTP in a variety of ways. The different varieties of 2FA are determined by how the OTP is provided. The OTP can be sent via email, SMS, as a software token using applications such as Google Authenticator, or as a hardware token.